Help Net Security

The evolution of DevSecOps
73% of IT decision-makers admit more could be done to improve their DevSecOps practices, with many organizations behind in their goals, according to a survey conducted by …

How companies time data leak disclosures
Every year the personal data of millions of people, such as passwords, credit card details, or health details, fall into the hands of unauthorized persons through hacking or …

Connected medical devices are the Achilles’ heel of healthcare orgs
The rising adoption of connected medical devices is accelerating cyberattacks, according to Capterra’s Medical IoT Survey of healthcare IT professionals. The survey also …

Week in review: Log4Shell lingers, NIS2 directive adopted, LastPass breached (again)
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: The top 200 most common passwords in 2022 are bad, mkay? According to …

New infosec products of the week: December 2, 2022
Here’s a look at the most interesting products from the past week, featuring releases from Adaptive Shield, Datadog, Delinea, Fortinet, LogicGate, Shoreline, and Trend Micro. …

Don’t ignore the security risks of limitless cloud data
Over the past two decades, technology has evolved to make it easy and affordable for companies to collect, store and use massive amounts of data. From AWS to Google Cloud to …

Consumers want convenience without sacrificing security
Consumers worldwide want frictionless online experiences without sacrificing the security of personal information, according to a recent survey from Ping Identity. With 63% …

CI Fuzz CLI: Open-source tool to test Java apps for unexpected behaviors
CI Fuzz CLI, the open-source Command-Line Interface (CLI) tool from Code Intelligence, now allows Java developers to easily incorporate fuzz testing into their existing JUnit …

Financial organizations more prone to accidental data leakage
Netwrix announced additional findings for the financial and banking sector from its global 2022 Cloud Security Report. Compared to other industries surveyed, financial …

A year later, Log4Shell still lingers
72% of organizations remain vulnerable to the Log4Shell vulnerability as of October 1, 2022, Tenable‘s latest telemetry study has revealed, based on data collected from …

Cybersecurity engineering under the Federal Trade Commission
When the Federal Trade Commission (FTC) releases new regulations or changes to existing ones, the implications may not be obvious to the average business or company employees. …

Why are K-12 educational institutions reluctant to report cyber incidents?
A recent report from the US Government Accountability Office (GAO) has shown that K-12 educational institutions are reluctant to report cyber incidents as they fear they would …
Featured news
Resources
Don't miss
- AWS Trusted Advisor flaw allowed public S3 buckets to go unflagged
- Using lightweight LLMs to cut incident response times and reduce hallucinations
- Fractional vs. full-time CISO: Finding the right fit for your company
- Product showcase: iStorage datAshur PRO+C encrypted USB flash drive
- Apple fixes zero-day vulnerability exploited in “extremely sophisticated attack” (CVE-2025-43300)